Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Key Vulnerabilities, Threats, and Data Breaches

Posted on July 13, 2025July 13, 2025 By CWS

In immediately’s quickly evolving digital panorama, the frequency and complexity of cyberattacks are rising, making it essential to remain knowledgeable about rising threats. Our weekly publication serves as an important useful resource, providing an outline of pertinent cybersecurity developments, professional evaluation, and actionable suggestions.

This difficulty covers current cyber incidents, newly recognized vulnerabilities, and key legislative updates affecting organizations globally. We concentrate on refined phishing makes an attempt, the rise of ransomware, and safety flaws impacting cloud infrastructures and IoT gadgets.

Our purpose is to empower you to determine potential threats early and improve your group’s safety posture. Count on common highlights of rising dangers, suggestions for superior safety instruments, and insights into cutting-edge applied sciences.

Thanks for trusting us as your cybersecurity data supply. We encourage your engagement in discussing challenges and connecting with a group devoted to strengthening our digital setting. Keep vigilant and knowledgeable—proactive consciousness is crucial for defending towards on-line threats.

Threats

1. NightEagle APT Targets China’s Excessive-Tech Sectors

A complicated APT group, NightEagle (APT-Q-95), has been exploiting unknown Alternate vulnerabilities since 2023 to focus on China’s essential know-how sectors, together with AI, quantum know-how, semiconductors, and army industries. Utilizing adaptive malware and memory-resident methods, they’ve managed to steal delicate intelligence for practically a 12 months. Their operations, energetic from 9 PM to six AM Beijing time, counsel a Western origin, probably North America. Learn Extra

2. Menace Actors Exploit Signed Drivers for Kernel-Stage Assaults

Cybercriminals are abusing Microsoft’s Home windows {Hardware} Compatibility Program to signal malicious kernel drivers, bypassing safety defenses. Over 620 drivers have been compromised since 2020, with a peak in 2022. This underground marketplace for code-signing certificates, usually tied to Chinese language risk actors, poses a extreme danger to system integrity. Learn Extra

3. BladeDFeline Malware Assault

Particulars on the BladeDFeline malware assault are presently restricted on account of inaccessible content material. We are going to present updates as extra data turns into accessible. Learn Extra

4. NordDragonScan Targets Home windows Customers

A high-severity marketing campaign involving NordDragonScan infostealer is focusing on Microsoft Home windows customers. Distributed by way of malicious HTA scripts and RAR archives, it harvests browser profiles, paperwork, and screenshots, sending knowledge to a command-and-control server. This risk underscores the necessity for strong endpoint safety. Learn Extra

5. Ingram Micro Hit by Ransomware Assault

World IT distributor Ingram Micro suffered a ransomware assault over the July 4 weekend, attributed to the SafePay group. The incident disrupted ordering techniques and the MS Xvantage platform throughout a number of areas. Whereas operations are largely restored, it highlights vulnerabilities in digital provide chains. Learn Extra

6. Weaponized Chrome Extension Delivers Malware

A malicious Chrome extension, recognized in August 2024, delivers weaponized ZIP archives containing the LummaC2 stealer. Able to manipulating cryptocurrency accounts and stealing intensive system knowledge, this extension poses a big danger to customers’ monetary safety.Learn Extra

7. Bluetooth Protocol Stack Vulnerabilities

Historic vulnerabilities in Bluetooth stacks, equivalent to BrakTooth and BleedingTooth, have uncovered billions of gadgets to denial-of-service and code execution dangers. These flaws, present in Linux and different techniques, emphasize the continuing want for well timed patches and vigilance in IoT and private system safety. Learn Extra

8. Hackers Exploit GeoServer RCE Vulnerability

A essential Distant Code Execution flaw (CVE-2024-36401) in GeoServer GeoTools software program is below energetic exploitation, permitting attackers to deploy malware like cryptocurrency miners. Unpatched cases, particularly in South Korea, face vital dangers, prompting pressing requires updates. Learn Extra

9. Qilin Emerges as High Ransomware Group

Qilin has solidified its place because the main ransomware group in 2025, with 86 claimed victims in June alone. Concentrating on high-value sectors like telecom and healthcare, primarily within the U.S., Qilin’s double-extortion ways and complex affiliate help make it a formidable risk. Learn Extra

Vulnerabilities

1. Scriptcase Vulnerabilities Expose Techniques to Assaults

A number of essential vulnerabilities have been recognized in Scriptcase, a low-code improvement platform, notably in variations like 9.4.019 and 9.10.023. These flaws embrace arbitrary file uploads, path traversal, and cross-site scripting (XSS), permitting attackers to add malicious information, bypass safety restrictions, and inject dangerous code into person accounts. Learn Extra

2. Linux Boot Vulnerability Bypasses Safe Boot Protections

A major flaw within the Linux boot course of, affecting distributions like Ubuntu, Debian, Fedora, and AlmaLinux, permits attackers with temporary bodily entry to bypass Safe Boot by way of the Preliminary RAM Filesystem (initramfs) debug shell. By triggering this shell with incorrect password makes an attempt, malicious hooks may be injected for persistent entry. Learn Extra

3. Comodo Web Safety 2025 Flaws Allow Distant Code Execution

Crucial vulnerabilities in Comodo Web Safety 2025 (model 12.3.4.8162) expose customers to distant code execution with SYSTEM privileges. Points embrace improper certificates validation, path traversal, and lack of information authenticity checks, enabling man-in-the-middle assaults and arbitrary file writes. Learn Extra

4. CISA Warns of Lively Exploitation in Zimbra Collaboration Suite

The Cybersecurity and Infrastructure Safety Company (CISA) has issued an advisory about a number of vulnerabilities in Zimbra Collaboration Suite (ZCS) being actively exploited. These flaws, equivalent to CVE-2022-27924, permit unauthenticated attackers to steal electronic mail credentials and compromise techniques in authorities and personal sectors. Learn Extra

5. SAP July 2025 Patch Day Addresses Crucial Flaws

SAP’s July 2025 Safety Patch Day launched 27 new safety notes, tackling essential vulnerabilities in S/4HANA, NetWeaver, and Reside Public sale Cockpit. With CVSS scores as much as 10.0, flaws like CVE-2025-30012 allow distant code execution and full system compromise by means of insecure deserialization. Learn Extra

6. FortiOS Buffer Overflow Vulnerability Dangers Code Execution

Fortinet disclosed a heap-based buffer overflow vulnerability (CVE-2025-24477) in FortiOS, affecting the cw_stad daemon. Although rated medium severity (CVSS 4.0), authenticated attackers might exploit this to execute arbitrary code and escalate privileges.Learn Extra

7. Microsoft Patch Tuesday July 2025 Fixes 137 Flaws

Microsoft’s July 2025 Patch Tuesday addressed 137 vulnerabilities, together with a zero-day in SQL Server and 14 essential points throughout Home windows, Workplace, Azure, and extra. Key fixes goal distant code execution and elevation of privilege flaws, urging instant updates.Learn Extra

8. Apache Tomcat DoS Vulnerabilities Threaten Internet Servers

Crucial flaws in Apache Tomcat (variations 9.0.x to 11.0.x), together with CVE-2025-48976 and CVE-2025-48988, allow denial-of-service (DoS) assaults by means of reminiscence exhaustion and multipart add abuse. Authentication bypass can also be doable, requiring pressing patches.Learn Extra

9. Home windows BitLocker Bypass Vulnerability

A vulnerability in Home windows BitLocker permits attackers to bypass encryption protections below particular situations. This flaw poses a danger to knowledge safety on affected techniques, and customers are suggested to use the newest patches from Microsoft to mitigate potential exploits.Learn Extra

10. Splunk Third-Celebration Packages Impression SOAR Variations

Points with third-party packages in Splunk SOAR variations have been recognized, doubtlessly affecting system integrity and safety automation. Organizations utilizing Splunk SOAR ought to evaluate updates and patches to handle these dependencies.Learn Extra

11. Microsoft Enhances Microsoft 365 Safety Options

Microsoft has launched new safety enhancements for Microsoft 365 to bolster safety towards evolving threats. These updates goal to enhance knowledge safety and compliance for enterprise customers amidst rising cyber dangers.Learn Extra

Home windows

1. Home windows Replace Notifications Challenge Resolved

A current replace has addressed a persistent difficulty with Home windows notification sounds, guaranteeing that on-screen alerts and different multimedia notifications now play as anticipated. This repair is a part of Microsoft’s ongoing efforts to boost person expertise and system reliability.

2. PowerShell 2.0 Deprecated in Home windows 11

Microsoft has formally phased out PowerShell 2.0, beginning with the newest Home windows 11 Insider builds. This transfer, lengthy anticipated since its deprecation in 2017, goals to bolster safety by eliminating a software with outdated structure that has been exploited by malware. Customers are inspired emigrate to PowerShell 5.1 or the newer 7.x sequence for enhanced performance and security.

3. KB5062554: Home windows 10 Cumulative Replace for July 2025

Microsoft rolled out the obligatory KB5062554 cumulative replace for Home windows 10 variations 21H2 and 22H2 as a part of the July 2025 Patch Tuesday. This replace consists of safety patches addressing one zero-day vulnerability and 136 different flaws, bumping builds to 19044.6093 and 19045.6093. Customers can set up it by way of Home windows Replace or obtain it from the Microsoft Replace Catalog.

4. Microsoft Outlook Outage Impacts World Customers

On July 9-10, 2025, Microsoft Outlook skilled a widespread outage, affecting customers worldwide for practically 20 hours. The disruption impacted entry to electronic mail companies throughout net, cellular, and desktop platforms. Microsoft deployed configuration adjustments to resolve the problem, with service restoration nearing completion by July 10 afternoon.

5. Microsoft Alternate On-line Service Disruption

Microsoft not too long ago confronted a world outage affecting the Alternate Admin Middle and Alternate On-line, disrupting directors’ entry to essential administration instruments. The problem, marked by HTTP Error 500, was below investigation with non permanent workarounds recommended. This incident additionally impacted associated companies like Groups Calendar for some customers.

6. Home windows 11 Introduces Black Display of Demise

Microsoft is remodeling the long-lasting Blue Display of Demise (BSOD) right into a Black Display of Demise (BkSOD) for Home windows 11, aligning with the darkish theme and aiming for a much less intimidating crash expertise. Rolling out to the Launch Preview channel, this replace guarantees sooner reboots and introduces a Fast Machine Restoration characteristic for enterprise customers to assist in system restoration.

Threats

1. Trojanized Variations of PuTTY and WinSCP Goal IT Admins

A complicated web optimization poisoning marketing campaign is focusing on IT professionals with malicious variations of in style instruments like PuTTY and WinSCP. Since early June 2025, attackers have used faux web sites and sponsored adverts to trick customers into downloading Trojanized installers that deploy the Oyster/Broomstick backdoor. This malware establishes persistence by means of scheduled duties and malicious DLLs, posing a extreme danger to enterprise networks because of the elevated privileges of its targets.

2. BERT Ransomware Disrupts ESXi Digital Machines

A brand new ransomware group, BERT (additionally tracked as Water Pombero), has emerged with a damaging tactic of forcibly shutting down ESXi digital machines earlier than encryption. First noticed in April 2025, this malware targets virtualized environments throughout a number of continents, complicating restoration by invalidating snapshot backups. Its skill to execute shutdown instructions on VMware ESXi hypervisors makes it a big risk to knowledge facilities.

3. Scattered Spider’s Subtle Cyber Intrusion Ways

Scattered Spider, a infamous cybercriminal group, continues to focus on giant organizations and their IT assist desks with superior methods. Using a big selection of instruments like ADRecon, Mimikatz, and living-off-the-land strategies, they make use of phishing, SIM swapping, and social engineering to attain account takeovers. Their evolving methods, together with encrypted communications, pose ongoing challenges to cybersecurity defenses.

4. NetSupport RAT Spreads by way of Compromised WordPress Websites

Menace actors are exploiting hacked WordPress websites to distribute malicious variations of the NetSupport Supervisor Distant Entry Instrument (RAT). Utilizing phishing emails, PDFs, and gaming boards, attackers lure customers to compromised websites the place malicious JavaScript triggers a multi-stage assault chain. The marketing campaign employs the “ClickFix” method with faux CAPTCHA pages to deploy payloads, focusing on Home windows customers for long-term management.

5. SparkKitty Trojan Targets iOS and Android Customers

Kaspersky researchers have uncovered SparkKitty, a brand new Trojan spy affecting each iOS and Android gadgets. Disguised as crypto, playing, and TikTok apps, this malware steals photographs and system data, probably aiming to pilfer cryptocurrency property from customers in Southeast Asia and China. This marks the second such discovery on the App Retailer inside a 12 months, highlighting persistent cellular safety dangers.

6. Weaponized VS Code Extensions Pose Provide Chain Menace

Attackers are focusing on builders by means of the Visible Studio Code extensions market by importing rogue extensions that mimic official ones. These malicious extensions, which run with person privileges with out sandboxing, can set up ransomware or different threats. Analysis reveals how simply attackers can bypass verification badges, impacting 1000’s of customers with misleading installs.

7. Rhadamanthys Infostealer Leverages ClickFix Method

The Rhadamanthys Stealer, first recognized in 2022, has resurfaced with a misleading ClickFix CAPTCHA supply technique. This fileless assault chain makes use of spearphishing and obfuscated PowerShell scripts to steal delicate knowledge like login credentials and cryptocurrency pockets particulars. Its stealthy strategy exploits person belief, posing a big problem to conventional safety measures.

8. Hackers Abuse GitHub for Malicious Actions

Cybercriminals have been abusing GitHub and different Git repository platforms like GitLab and Bitbucket for malicious functions. Historic incidents present attackers utilizing compromised credentials to wipe repositories and go away ransom notes, demanding Bitcoin funds. Such assaults spotlight the dangers of storing delicate knowledge in plaintext and the necessity for strong entry controls.

9. New Zuru Malware Variant Targets macOS Customers

A brand new variant of the Zuru malware is actively focusing on macOS customers, exploiting system vulnerabilities to compromise gadgets. Whereas particular particulars on its assault vector and impression are nonetheless rising, this improvement underscores the rising focus of risk actors on Apple’s ecosystem, historically thought-about safer than different platforms. Learn Extra

Cyber Security News Tags:Breaches, Data, Key, Threats, Vulnerabilities

Post navigation

Previous Post: How to Monitor Your Identity on the Dark Web
Next Post: How to Perform OSINT on Yourself

Related Posts

Top Ransomware Actors Actively Attacking Financial Sector, 406 Incidents Publicly Disclosed Cyber Security News
Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware Cyber Security News
Smart Electric Vehicles Face Hidden Cyber Vulnerabilities Exposing Drivers to Risks Cyber Security News
Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks Cyber Security News
8 New Malicious Firefox Extensions Steal OAuth Tokens, Passwords, and Spy on Users Cyber Security News
New ZuRu Malware Variant Attacking macOS Users Via Weaponized Termius App Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Perform OSINT on Yourself
  • Key Vulnerabilities, Threats, and Data Breaches
  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Perform OSINT on Yourself
  • Key Vulnerabilities, Threats, and Data Breaches
  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News